Analysis
-
max time kernel
164s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 08:58
Static task
static1
Behavioral task
behavioral1
Sample
7f67b26c635927694f0397efc717ec08.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7f67b26c635927694f0397efc717ec08.exe
Resource
win10v2004-20231215-en
General
-
Target
7f67b26c635927694f0397efc717ec08.exe
-
Size
12KB
-
MD5
7f67b26c635927694f0397efc717ec08
-
SHA1
bcac3ee4a545db4d2bcf7deee4e3c93222bc0750
-
SHA256
fbcbbe7c79dfdac4586e2f20393384f03764c6555d357698476ffa5c4e1d9e80
-
SHA512
1f056abb0a8630fad17a212da29f71d9a5f1ca9d8482510fc588ada32c471c97154ed5fd509fd788107bca3c64b2380ab797d1f73bd932eacf805e22e4e7e3c2
-
SSDEEP
384:6K+dKfzQHxFxRmyja4QhiP7UlY/pjKhYsKUAylUmtsYQ:v+dAURFxna4QAPQlYghxKUAyl9tTQ
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 7f67b26c635927694f0397efc717ec08.exe -
Executes dropped EXE 1 IoCs
pid Process 4632 szgfw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2492 wrote to memory of 4632 2492 7f67b26c635927694f0397efc717ec08.exe 90 PID 2492 wrote to memory of 4632 2492 7f67b26c635927694f0397efc717ec08.exe 90 PID 2492 wrote to memory of 4632 2492 7f67b26c635927694f0397efc717ec08.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f67b26c635927694f0397efc717ec08.exe"C:\Users\Admin\AppData\Local\Temp\7f67b26c635927694f0397efc717ec08.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:4632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD50c29f542405a0ddb335dde2aa70408e9
SHA145834983e263635f4d974bb5bb2b5437262e123a
SHA25620b7fcd81f91ad0b13684cb4aba8a57e057d5fcd2dfe1d21825032845fc2feb9
SHA51271a8151f6559d8d665f8482d3acf672c061a7a80cb17e2f110c48f38db0c7855c2b9459a165fa7cb3a83ab2c0fffe102bf105a154d60367dc0853c56a5ed9a78